首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   506篇
  免费   0篇
  506篇
  2021年   5篇
  2019年   13篇
  2018年   9篇
  2017年   12篇
  2016年   9篇
  2015年   10篇
  2013年   85篇
  2011年   5篇
  2010年   7篇
  2009年   4篇
  2007年   7篇
  2006年   7篇
  2005年   13篇
  2004年   8篇
  2003年   5篇
  2001年   4篇
  2000年   9篇
  1999年   6篇
  1998年   5篇
  1997年   9篇
  1996年   12篇
  1995年   5篇
  1994年   10篇
  1993年   8篇
  1992年   8篇
  1991年   14篇
  1990年   8篇
  1989年   12篇
  1988年   6篇
  1987年   12篇
  1986年   9篇
  1985年   12篇
  1984年   10篇
  1983年   7篇
  1982年   7篇
  1981年   8篇
  1980年   11篇
  1979年   8篇
  1978年   8篇
  1977年   8篇
  1976年   9篇
  1975年   6篇
  1974年   11篇
  1973年   8篇
  1972年   9篇
  1971年   13篇
  1969年   6篇
  1968年   5篇
  1967年   3篇
  1966年   3篇
排序方式: 共有506条查询结果,搜索用时 0 毫秒
381.
Retrial queueing systems are widely used in teletraffic theory and computer and communication networks. Although there has been a rapid growth in the literature on retrial queueing systems, the research on retrial queues with nonexponential retrial times is very limited. This paper is concerned with the analytical treatment of an M/G/1 retrial queue with general retrial times. Our queueing model is different from most single server retrial queueing models in several respectives. First, customers who find the server busy are queued in the orbit in accordance with an FCFS (first‐come‐first‐served) discipline and only the customer at the head of the queue is allowed for access to the server. Besides, a retrial time begins (if applicable) only when the server completes a service rather upon a service attempt failure. We carry out an extensive analysis of the queue, including a necessary and sufficient condition for the system to be stable, the steady state distribution of the server state and the orbit length, the waiting time distribution, the busy period, and other related quantities. Finally, we study the joint distribution of the server state and the orbit length in non‐stationary regime. © 1999 John Wiley & Sons, Inc. Naval Research Logistics 46: 561–581, 1999  相似文献   
382.
In 2002, a Nuclear Security Culture (NSC) Enhancement Program with the mission to raise the level of the NSC at sites and facilities in Russia's nuclear complex was launched under the guidance of the Russian State Corporation “ROSATOM” and with support from the US Department of Energy. A Joint Working Group for NSC with both Russian Federation and US members was formed and charged with the design and implementation of the program. The program was implemented at sites and facilities on a pilot basis. Nine sites participated in the Pilot Project. The key program component was an establishment of Culture Coordinators (CCs) with the authority to coordinate and implement NSC enhancement activities at sites and facilities. The CCs have served as the force that has maintained the momentum of the Pilot Project and continuously steered the site NSC enhancement efforts. The contribution of the CCs in achieving the positive outcomes of the program cannot be overstated.  相似文献   
383.
Tactical learning is critical to battlefield success, especially in a counterinsurgency. This article tests the existing model of military adaption against a ‘most-likely’ case: the British Army’s counterinsurgency in the Southern Cameroons (1960–61). Despite meeting all preconditions thought to enable adaptation – decentralization, leadership turnover, supportive leadership, poor organizational memory, feedback loops, and a clear threat – the British still failed to adapt. Archival evidence suggests politicians subverted bottom-up adaptation, because winning came at too high a price in terms of Britain’s broader strategic imperatives. Our finding identifies an important gap in the extant adaptation literature: it ignores politics.  相似文献   
384.
A classic problem in Search Theory is one in which a searcher allocates resources to the points of the integer interval [1, n] in an attempt to find an object which has been hidden in them using a known probability function. In this paper we consider a modification of this problem in which there is a protector who can also allocate resources to the points; allocating these resources makes it more difficult for the searcher to find an object. We model the situation as a two‐person non‐zero‐sum game so that we can take into account the fact that using resources can be costly. It is shown that this game has a unique Nash equilibrium when the searcher's probability of finding an object located at point i is of the form (1 − exp (−λixi)) exp (−μiyi) when the searcher and protector allocate resources xi and yi respectively to point i. An algorithm to find this Nash equilibrium is given. © 2000 John Wiley & Sons, Inc. Naval Research Logistics 47:85–96, 2000  相似文献   
385.
A new technique for solving large‐scale allocation problems with partially observable states and constrained action and observation resources is introduced. The technique uses a master linear program (LP) to determine allocations among a set of control policies, and uses partially observable Markov decision processes (POMDPs) to determine improving policies using dual prices from the master LP. An application is made to a military problem where aircraft attack targets in a sequence of stages, with information acquired in one stage being used to plan attacks in the next. © 2000 John Wiley & Sons, Inc., Naval Research Logistics 47: 607–619, 2000  相似文献   
386.
Damage tolerant methodology is increasingly used in aeronautical components,especially due the fact that the Aviation Regulation requires such an assessment in case an accidental damage occurs.At pre-sent,there is a strong and actual interest in applying such procedures to helicopter components that are subjected to high frequency cyclic loads.In this paper,an investigation on a damaged transmission shaft for a tail rotor transmission of an actual helicopter has been carried out focusing on the fatigue crack propagation.A complete sequence of experimental tests was performed in order to create an actual ballistic damage and to subsequently check the damage tolerant behaviour.The shaft was damaged by oblique ballistic impact and was subsequently subjected to torsional fatigue loading.During the fatigue cycles several cracks propagated from the ballistic damages.Both of these steps(impact and fatigue loading)were also simulated by a complex modelling approach based on Finite Element Models and fracture mechanics theory.The comparison between the experimental and numerical results shows a good agreement but it underlines the need for a very refined modelling technique capable to replicate all the features associated with the damage in order to reliably simulate the subsequent propagation phase.  相似文献   
387.
The new numerical approach for analysis of the warhead transportations is suggested.This approach allows to control the warhead operability before its experimental analysis.The approach is implemented by the adequate models for the software ANSYS.Analysis of the loads at land operations and trans-portations of the warhead by natural roads,water and aviation allows to obtain the maximal values of loads,which are used in numerical simulations of the warhead.These loads give an opportunity to analyze the operability and the fatigue strength of the cartridge warhead.The numerical simulations of the attachments of the warhead combat elements are performed on the basis of the suggested method.The data of the numerical simulations verifies the operability of the fastener system of the warhead combat elements.  相似文献   
388.
    
This paper describes modeling and operational analysis of a generic asymmetric service‐system situation in which (a) Red agents, potentially threatening, but in another but important interpretation, are isolated friendlies, such as downed pilots, that require assistance and “arrive” according to some partially known and potentially changing pattern in time and space; and (b) Reds have effectively limited unknown deadlines or times of availability for Blue service, i.e., detection, classification, and attack in a military setting or emergency assistance in others. We discuss various service options by Blue service agents and devise several approximations allowing one to compute efficiently those proportions of tasks of different classes that are successfully served or, more generally, if different rewards are associated with different classes of tasks, the percentage of the possible reward gained. We suggest heuristic policies for a Blue server to select the next task to perform and to decide how much time to allocate to that service. We discuss this for a number of specific examples. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006.  相似文献   
389.
    
We consider the effects of cueing in a cooperative search mission that involves several autonomous agents. Two scenarios are discussed: one in which the search is conducted by a number of identical search‐and‐engage vehicles and one where these vehicles are assisted by a search‐only (reconnaissance) asset. The cooperation between the autonomous agents is facilitated via cueing, i.e., the information transmitted to the agents by a searcher that has just detected a target. The effect of cueing on the target detection probability is derived from first principles using a Markov chain analysis. In particular, it is demonstrated that the benefit of cueing on the system's effectiveness is bounded. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006  相似文献   
390.
    
The paper addresses the problem of a patrol trying to stop smugglers who are attempting to ship a cargo of perishable contraband across a strait in one of M time units. The situation was modeled as a two-person zero-sum game of exhaustion by Thomas and Nisgav and this article extends their results. The game has many characteristics in common with the Inspection Game in Owen's book on Game Theory; this Inspection Game is generalized and the relations between the two games are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号